Screentro.ai Feature
One Interview, One Device. No Exceptions.
Device Fingerprint Scan detects and tracks the unique identity of every device used during an interview—helping you identify unauthorized setups, secondary systems, and cloned environments
Device Fingerprint Scan is an advanced anti-cheating technology that generates a unique digital fingerprint for every device a candidate uses during an interview session. It uses a combination of hardware identifiers, browser attributes, operating system details, and network configurations to create a precise, non-invasive ID of the candidate’s device.
This feature is specifically designed to detect multi-device setups, cloned environments, and unauthorized systems used by fraudsters attempting to bypass interview integrity measures by simulating a legitimate environment on one device while cheating on another.
Why Device Fingerprinting Matters in Interviews?
Some candidates may attempt to:
· Use one device to appear in the interview (e.g., laptop), while receiving assistance from another (e.g., phone/tablet).
· Clone the interview program into a virtual machine or remote desktop session.
· Conduct interviews from shared or tampered devices that mimic compliance.
Device Fingerprint Scan puts a stop to that. It provides:
· Persistent identification of each unique device.
· Tracking across sessions to spot reused, altered, or inconsistent environments.
· Alerts for anomalies, like running the program in virtual machines, emulators, or screen-shared devices.
Unique Device Signature
· Combines dozens of parameters such as OS version, CPU ID, graphics card, screen resolution, browser version, plugins, local time offset, fonts, media devices, and more.
· Generates a unique and consistent fingerprint per device—identifying even slight changes.
Multi-Device Usage
· Flags candidates using more than one device for a single interview.
· Detects if a candidate is attempting to mirror or stream the session to another screen.
· Captures device switchovers or multiple logins during or between interview sessions.
Virtual Machines & Emulators
· Detects use of virtual environments (VMWare, VirtualBox, Parallels, etc.) or sandboxed systems.
· Flags suspicious setups where candidates try to hide their real system behind a virtual one.
Device Spoofing or Cloning
· Identifies attempts to mask or spoof device attributes to appear compliant while cheating.
· Detects tools used for identity masking, such as browser spoofers or fake OS environments.
Reused or Shared Devices
· Flags when the same device fingerprint appears across multiple interviews or candidates.
· Useful for identifying fraud rings, shared test setups, or outsourcing fraud operations.
✅ Prevent Hidden Device Cheating
Ensure candidates are not using a second device for coaching, screen-sharing, or answer-feeding during the interview.
🧠 Detect Coordinated Cheating Patterns
Uncover reuse of devices across different candidates—especially helpful in spotting coaching scams or fraudulent agencies.
🛡️ Catch Virtual Machine Abuse
Some candidates try to run your program inside a virtual machine to isolate and spoof behavior. This scan flags that tactic instantly.
🔐 Add a Layer of Trust and Transparency
When you can verify the environment in which a candidate interviews, you can confidently assess their performance and authenticity.
· Data-Safe Fingerprinting: We hash all device identifiers; no personally identifying information is stored or shared.
· GDPR & CCPA Compliant: Full transparency and opt-in consent during the scanning process.
· Non-Invasive: No access to candidate files, apps, or personal data—only device-level environment metrics.